Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html
-
Size
461KB
-
MD5
db423d81e5ec79afd63f956d132cf6e4
-
SHA1
2f7e0825b8f0e6e6f685d02f6964e3c0c3a90ba6
-
SHA256
21a87b77815cd90c92bdd7cfb4c7168cd7e9e4ba68cce41b1750b64938e44580
-
SHA512
ee8776713096df16e46fd1614ce1c5e399542d6ecb4afc8a73a31cc3913b9ec5c2b888e66858af0c6d2fdef44ba51da61e09cc2652c9c55269de65b2a19ccd4e
-
SSDEEP
6144:SxsMYod+X3oI+YLQIsMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3F5d+X3n5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3880 msedge.exe 3880 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3140 3880 msedge.exe 83 PID 3880 wrote to memory of 3140 3880 msedge.exe 83 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3976 3880 msedge.exe 84 PID 3880 wrote to memory of 3484 3880 msedge.exe 85 PID 3880 wrote to memory of 3484 3880 msedge.exe 85 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86 PID 3880 wrote to memory of 1228 3880 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca88e46f8,0x7ffca88e4708,0x7ffca88e47182⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2296 /prefetch:82⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6524502916109229764,10666020218473505521,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD510d1bd4ef2ee19147a74a6c409043245
SHA1620076dcfe32479ca896d1f911eac10bfef61890
SHA256a4b266224b4db37cdd620787883d9c3175e6247b2d69f184b6988a03f87f60e8
SHA5128157126e2fba6536dff746aa76136fea771c6f428976e266e25a949894705c4295990e61fa8dc4bfb8d88cb366347d152373f47da16d207f3c8a02d37dbbab70
-
Filesize
5KB
MD5fe0f0a9ecca3f3c64a34a9cf26f24c93
SHA1ce3aff456c0a322c0a24c71655dc4927bdf79bcf
SHA256e15652f2237f62bc0c500d1f16d3a53ae76e69b30cad8130c861941e1f3dcdc7
SHA512517440fa541afabaa4f1c10852437a050f068bdfaefa0f0545ec0d1e805bb6322625b31096bfdcf7c20ab73e3fe299038333aa0cdba4d0783b24d995eecf3eee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54d80ea2f14f8e6e759849b64e45d0332
SHA143a6c248236948a58d68bde8915d8737e6082443
SHA256602c898634925cc9b1b1f8123c9a22c798ead175750c32f827b798b8b0cd91c0
SHA512e71a6cc89ecf948ba1275bf2c3181c04aa5bd926161a00c461981c54109786821bd6eb513c33ffa2e4fa7d319daba0fb146ee1e760f221b632661ab377eaa4c8